ECCouncil 312-38 - Certified Network Defender (CND)
Management wants to calculate the risk factor for their organization. Kevin, a network administrator in the organization knows how to calculate the risk factor. Certain parameters are required before calculating risk
factor. What are they? (Select all that apply) Risk factor =.............X...............X...........
Which of the following network security controls can an administrator use to detect, deflect or study attempts to gain unauthorized access to information systems?
Which of the following statements holds true in terms of virtual machines?
What represents the ability of an organization to respond under emergency in order to minimize the damage to its brand name, business operation, and profit?
Daniel is giving training on designing and implementing a security policy in the organization. He is explaining the hierarchy of the security policy which demonstrates how policies are drafted, designed and implemented.
What is the correct hierarchy for a security policy implementation?
What should a network administrator perform to execute/test the untrusted or untested programs or code from untrusted or unverified third-parties without risking the host system or OS?
Which of the following provides the target for designing DR and BC solutions?
On which layer of the OSI model does the packet filtering firewalls work?
Assume that you are a network administrator and the company has asked you to draft an Acceptable Use Policy (AUP) for employees. Under which category of an information security policy does AUP fall into?
Which of the following network security protocols protects from sniffing attacks by encrypting entire communication between the clients and server including user passwords?